<br />
<b>Deprecated</b>:  Function create_function() is deprecated in <b>/home/hidefide/public_html/blog/wp-content/plugins/wr-pagebuilder/core/core.php</b> on line <b>127</b><br />
{"id":95,"date":"2011-06-12T12:14:11","date_gmt":"2011-06-12T12:14:11","guid":{"rendered":"https:\/\/icaruspressblog.wordpress.com\/?p=95"},"modified":"2019-04-17T12:23:40","modified_gmt":"2019-04-17T12:23:40","slug":"imf-the-latest-to-be-hit-the-war-in-cyberspace-heats-up","status":"publish","type":"post","link":"https:\/\/hidefideas.com\/blog\/2011\/06\/12\/imf-the-latest-to-be-hit-the-war-in-cyberspace-heats-up\/","title":{"rendered":"IMF the Latest to be Hit; The War in Cyberspace Heats Up"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-97\" style=\"float: right; padding-left: 10px;\" src=\"http:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/nuke-war-h001.jpg\" alt=\"nuke-war-h001\" width=\"320\" height=\"377\" srcset=\"https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/nuke-war-h001.jpg 320w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/nuke-war-h001-255x300.jpg 255w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/nuke-war-h001-127x150.jpg 127w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/>With 2011 nearly half over, the year so far has revealed a litany of high profile victims of cyberterrorism. To make matters even more disturbing, the U.S. has decided to declare war on anyone who dares infiltrate its servers. In a year where it seems you can\u2019t watch the news without learning about a new cyber attack, some interesting perspectives have been suggested, but when hackers decide what\u2019s right and what\u2019s not, where will it all end?<!--more--><\/p>\n<p>With 2011 Part I nearly in the bag, we\u2019ve seen an active year for high profile security breaches that include the likes of <a href=\"http:\/\/www.allspammedup.com\/2011\/05\/psn-security-breach-gaming-not-so-fun-anymore-a-warning-to-others\/\">Sony<\/a>, <a href=\"http:\/\/www.allspammedup.com\/2011\/06\/lockheed-martin-latest-to-succumb-to-%E2%80%9Csignificant%E2%80%9D-cyber-attack\/\">Lockheed Martin<\/a>, <a href=\"http:\/\/www.scmagazineus.com\/citibank-cyberattack-affects-210000-customers\/article\/204857\/\">CitiBank<\/a>, <a href=\"http:\/\/www.allspammedup.com\/2011\/05\/epsilon-breach-responsible-for-new-spam-campaign-and-more\/\">Epsilon<\/a>, the <a href=\"http:\/\/www.allspammedup.com\/2011\/03\/malware-attack-prompts-european-commission-to-disable-remote-access\/\">European Commission<\/a>, and the governments of <a href=\"http:\/\/www.allspammedup.com\/2011\/03\/denial-of-service-attack-bombards-south-korean-websites\/\">South Korea<\/a> and <a href=\"http:\/\/www.physorg.com\/news\/2011-02-china-hackers-cyber-canada.html\">Canada<\/a> being stung by some form of cyber attack. To make matters even more sobering, the U.S. government recently <a href=\"http:\/\/www.pcworld.com\/article\/229068\/us_government_says_cyber_attacks_may_be_acts_of_war.html\">announced<\/a> that it would treat cyber attacks on its servers as an act of war and respond with a conventional military response to anyone who just can\u2019t keep their Internet connections to themselves.<\/p>\n<p>Then, when it didn\u2019t seem like things could get any more interesting, Reuters <a href=\"http:\/\/www.reuters.com\/article\/2011\/06\/10\/us-spain-anonymous-idUSTRE7593GV20110610\">reported<\/a> this week that three members of the hacktivist group Anonymous were arrested in Spain on charges of cyber attacks on Sony, banks and other organizations; mere hours later, Anonymous <a href=\"http:\/\/www.reuters.com\/article\/2011\/06\/12\/us-spanish-police-website-idUSTRE75B0YT20110612\">responded<\/a> by hitting the website of Spain\u2019s national police force.<\/p>\n<p>Also this week, the saga continued when the International Monetary Fund was the latest victim of an assault when their systems were infiltrated in what\u2019s been <a href=\"http:\/\/www.reuters.com\/article\/2011\/06\/11\/us-imf-cyberattack-idUSTRE75A20720110611\">described<\/a> as \u201cconnected to a foreign government, resulting in the loss of e-mails and other documents.\u201d IMF spokesperson David Hawley assured the world that the fund is still fully functional, but that the IMF, \u201care investigating an incident. I am not in a position to elaborate further on the extent of the cybersecurity incident,\u201d Hawley went on to say.<\/p>\n<p>Amidst the flurry of attacks, the U.S. government has stepped into the spotlight, perhaps in a proactive attempt to avoid being the target of a catastrophic attack. Reuters reported that, \u201cCIA Director Leon Panetta told the U.S. Congress this week the United States faces the &#8220;real possibility&#8221; of a crippling cyber attack.\u201d &#8220;The next Pearl Harbor that we confront,&#8221; said Panetta, could be an attack of their servers that, &#8220;cripples our power systems, our grid, our security systems, our financial systems, our governmental systems.\u201d In his Senate confirmation hearing to be the next U.S. Secretary of Defense, Panetta stated that, &#8220;This is a real possibility in today&#8217;s world.&#8221;<\/p>\n<h2><strong>Where Does It End?<\/strong><\/h2>\n<p>If a bona fide global assault is being waged in cyberspace, where will it end? To better understand what\u2019s been going on (and what could come next), one has to consider the source of these attacks \u2013 the hackers \u2013 and what motivates them. At the risk of generalizing things, it appears that there are four types of hackers, each with their own motivations, involved in the ongoing mayhem:<\/p>\n<ul>\n<li>Hacker groups like <a href=\"http:\/\/en.wikipedia.org\/wiki\/Anonymous_(group)\">Anonymous<\/a>, who have made it clear that they\u2019re in it to create mayhem \u2013 anarchists pure and simple. Less interested in monetary gain than in the creation of mayhem, groups like Anonymous find some sort of Robin Hood-like nobility in striking a blow for solidarity \u2013 for example their attacks on Sony in support of <a href=\"http:\/\/en.wikipedia.org\/wiki\/George_Hotz\">George Hotz<\/a>, iPhone hacker extraordinaire, who has been the <a href=\"http:\/\/www.ibtimes.com\/articles\/157107\/20110603\/sony-psn-security-hack-lulzsec-playstation-network-3-ps3-google-store-government.htm\">target<\/a> of legal action by Sony.<\/li>\n<li>Hacktivist groups like <a href=\"http:\/\/www.eurogamer.net\/articles\/2011-05-31-lulzsec-were-hacking-sony-right-now\">LulzSec<\/a> are a little different than Anonymous, in that not all their actions are decidedly destructive, they don\u2019t always have a cause, and they don\u2019t seem to be interested in any gain beyond revealing their prowess to the world. While LulzSec also wants to take a chunk out of Sony, other hack attacks seem more benevolent, if not misguided, in that they are merely trying to expose exploits that the target organizations seem to miss. Not entirely benevolent, they seem to be the Puck in the forest, mischievous and happy to embarrass, if their most recent <a href=\"http:\/\/www.pcworld.com\/article\/230122\/porn_site_users_beware_lulzsec_posts_your_email_address.html\">attempts<\/a> are any indication. Unfortunately, sometimes mischief can be more damaging than intent, as Michael Calce, aka <a href=\"http:\/\/en.wikipedia.org\/wiki\/MafiaBoy\">MafiaBoy<\/a> can <a href=\"http:\/\/mafiaboybook.com\/\">attest<\/a>.<\/li>\n<li>Hackers for profit, no more or less criminal than the two listed above, but less obvious since they don\u2019t announce themselves to the world and their intent is to remain hidden in the shadows. Needless to say, this is an awfully big bucket that contains pretty much every spammer, phishing enthusiast and scareware purveyor out there, but this group is no less dangerous than the others listed here, in terms of the damage that can be done, just on an individual user level. <a href=\"http:\/\/www.allspammedup.com\/2011\/04\/spear-phishing-email-nets-8m-from-media-giant-conde-nast\/\">Mostly<\/a>.<\/li>\n<li>Arguably the most dangerous of all, state sponsored hackers. <a href=\"http:\/\/www.reuters.com\/article\/2011\/06\/12\/us-rights-china-hacking-idUSTRE75B14J20110612\">China<\/a> has recently come clean about its <a href=\"http:\/\/www.infowar-monitor.net\/2011\/05\/china-admits-cyber-warfare-unit\/\">efforts<\/a> to \u2018protect\u2019 itself, and no one should doubt that every major nation in the world has a government unit dedicated to waging war on the Internet. While it may sound like Hollywood fiction and conspiracy theory, one has to look no further than the discovery of <a href=\"http:\/\/www.pcworld.com\/businesscenter\/article\/205827\/was_stuxnet_built_to_attack_irans_nuclear_program.html\">Stuxnet<\/a> in 2010 and the ongoing <a href=\"http:\/\/www.allspammedup.com\/2011\/03\/denial-of-service-attack-bombards-south-korean-websites\/\">attacks<\/a> against South Korea as evidence that the next World War will be waged, at least partially, in cyberspace.<\/li>\n<\/ul>\n<p>Will it really be the next Pearl Harbor, as Leon Panetta suggests? Is there any way to protect ourselves from deliberate attacks, or are the hackers just better at breaking things than we are at making things? Anonymous wasted no time retaliating against the Spanish police for taking three of their own into custody, and when it\u2019s not revealing user\u2019s porn site passwords and nipping at Sony\u2019s heels, LulzSec seems to be genuinely interested in <a href=\"http:\/\/www.allspammedup.com\/2011\/06\/hatriot-games-sony-hacked-again-nintendo-a-wii-bit-compromised\/\">helping<\/a> some websites. \u201cWe\u2019re not targeting Nintendo, \u201cLulzSec Tweeted after posting a Nintendo server configuration file on its website. \u201cWe like the N64 (gaming console) too much \u2013 we sincerely hope Nintendo plugs the gap.\u201d<\/p>\n<p>Misguided? Yes, for when any interest group \u2013 acting independently or under a state sponsored umbrella \u2013 decides where right starts and wrong ends, then we could all be in for a long and devastating war.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With 2011 nearly half over, the year so far has revealed a litany of high profile victims of cyberterrorism. To make matters even more disturbing,&hellip; <\/p>\n","protected":false},"author":3,"featured_media":97,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[11,9,10,8,7],"class_list":["post-95","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-spam","tag-allspammedup","tag-bot","tag-botnet","tag-malware","tag-spam","jsn-master"],"_links":{"self":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":3,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/95\/revisions"}],"predecessor-version":[{"id":1854,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/95\/revisions\/1854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media\/97"}],"wp:attachment":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media?parent=95"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/categories?post=95"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/tags?post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}